VPN Exposes Data for 1M Users, Leading to Researcher Questioning

Experts warn that virtual private networks are increasingly vulnerable to leaks and attack. Free virtual private network (VPN) service Quickfox, which provides access to Chinese websites from outside the country,…

Podcast: 67% of Orgs Have Been Hit by Ransomware at Least Once

Fortinet’s Derek Manky discusses a recent global survey showing that two-thirds of organizations suffered at least one ransomware attack, while half were hit multiple times. A recent report found that…

Best performing cybersecurity companies and their recent developments

Cybersecurity companies are the backbone to fight cybercrime – Let’s dig deeper into which cybersecurity company is doing what and how. Cybersecurity companies play a crucial role in protecting businesses…

Top 30 most exploited software vulnerabilities being used today

For all the zero-days, custom-crafted malware and other completely unknown security vulnerabilities, others have been around for years and are widely used across the board. To showcase this, the FBI…

Keep Attackers Out of VPNs: Feds Offer Guidance

The NSA and CISA issued recommendations on choosing and hardening VPNs to prevent nation-state APTs from weaponizing flaws & CVEs to break into protected networks. Unsecured VPNs can be a…

NSA, CISA share guidelines for securing VPNs as hacking groups keep busy

Cautioning that foreign government-backed hackers are actively exploiting vulnerabilities in virtual private network devices, the National Security Agency and the Department of Homeland Security’s cyber wing on Tuesday published guidelines…

BluStealer: from SpyEx to ThunderFox

Avast –  Avast –  Overview BluStealer is is a crypto stealer, keylogger, and document uploader written in Visual Basic that loads C#.NET hack tools to steal credentials. The family was…

Hackers dump login credentials of Fortinet VPN users in plain-text

By Waqas Fortinet VPN users are urged to reset their passwords as the company has acknowledged the data to be legitimate. This is a post from HackRead.com Read the original…